Skip to content

mhmatthewhugley/OnePlus-Nord-N10-5G-T-Mobile-BE2028-Carrier-Unlocked-Multiple_Things

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

⚠️ WARNING
To clone this entire repo you need 14.82GiB.
❗ Because this is only how I did it with my specific device,
⚡ No WARRANTY or SUPPORT is provided!

OnePlus-Nord-N10-5G-T-Mobile-BE2028-Carrier-Unlocked-Multiple_Things

What I did to flash INTL FIRMWARE to UN-brand the device(Oneplus Nord N10 5G BE2028, T-Mobile carrier unlocked), and flash Havoc OS with root(Magisk).

All instructions were written based on using Linux Mint 20.3 x86_64.

All files are copyrighted to their respective owner.

Firstly I would like to thank "@nosaj_33" for spending "5 hours, 38 minutes and 22 seconds" helping me UN-brand the device and giving me instruction. And the day before spending "44 minutes and 48 seconds" with me.

This section is what you need to unarchive/extract:
The platform-tools_r33.0.1-linux.zip if on Linux and it is the appropriate version needed:

  1. Extract Restore_OOS.7z.

  2. Extract the file OnePlusNordN105G_Restore_OOS11.0.5.BE86AA.zip.

  3. Make sure you unzip the ROM[Extract].7z for the actual files.

This section of instructions is for getting the patched boot image. And unlocking the bootloader:

  1. Start on Android 11, aka update the phone fully. You dont have to set the phone up and transfer and login because later the data will be reset.
  2. Enable developer options "Settings", then tap "About phone", then tap "Software version" untill it says it is enabled.
  3. Go to "Settings", then "System", then "Developer options", then enable "OEM unlocking", "Advanced reboot" and "USB debugging".
(For Metro/TMO: unlock the bootloader via https://www.oneplus.com/unlock_token)
gather and enter all the information to the page,
in order to get the unlock code you have to boot to the bootloader,
first, connect the phone to computer,
then there are two methods of getting to the bootloader:
. unlock the phone screen then hold the power button and click the 3 dots and click "Bootloader".
or
. run "./adb reboot bootloader".
then after one of those methods are done run "fastboot oem get_unlock_code".
While you wait for the unlock token you can prepare the rooted boot image:
  1. Transfer the boot image and magisk apk to the phone (Certain ROMs dont include it so you might have to extract it using a payload dumper or one of the other methods avaliable. I personally did the payload dumper.).
  2. Install apk.
  3. Go to the magisk application then click Magisk > Install > Select and Patch a File > select bootHavocOS.img > click LET'S GO
  4. Transfer the patched image to the computer, connect the phone to computer and run adb devices if nothing comes up make sure the prompt that came up was allowed, then run adb pull /sdcard/Download/<magisk_patched-numbers_lettersnumber.img>.
    Or transfer it any other way you want to.
  5. After you get the email with the unlock token you have to download the <unlock_code.bin> then boot to the bootloader,
    first, connect the phone to computer,
    then there are two methods of getting to the bootloader:
    . unlock the phone screen then hold the power button and click the 3 dots and click "Bootloader".
    or
    . run ./adb reboot bootloader.
    then unlock the bootloader by running: fastboot flash cust-unlock <unlock_code.bin>.
  6. Fully unlock the bootloader using fastboot oem unlock. WILL DELETE ALL DATA. You have to confirm it on the phone aswell.

This section of instructions is for flashing the INTL FIRMWARE and debloating:
10. Hold power button and then click the Restart button then when the screen goes black hold the volume down and power button then select English for your language.
11. Click "Advanced" then "Reboot to bootloader" then confirm it by clicking "Reboot to bootloader".
12. bash ./Files/script_1.sh.
. You dont have to set the phone up and transfer and login and all of that just skip it.
13. Enable developer options go to "Settings", then tap "About phone", then tap "Build number" untill it says it is enabled.
14. Go to "Settings", then "System", then "Developer Options", then enable "Advanced reboot" and "USB debugging".
15. Run the debloat.
16. bash ./Files/full_debloat.adb.
17. ./adb reboot recovery.
18. Click english, advanced, reboot to fastboot, confirm it.
19. ./fastboot flash recovery ./Files/HavocOS\ 2022-04-17/RECOVERY/recoveryHavocOS.img.
. Use the volume keys to select and use the power button to click "Recovery mode".
20. Click "Install update", "ADB Sideload".
21. ./adb sideload ./Files/copy-partitions-20210323_1922.zip.

This section of instructions is for flashing the ROM:
22. Like before ADB Sideload.
23. ./adb sideload ./Files/HavocOS\ 2022-04-17/ROM\ \[WITH\ GAPPS\]/Havoc-OS-v4.15-20220417-billie-Unofficial-GApps.zip.
24. Go back a menu then click "Advanced" then "Reboot to bootloader".
25. ./fastboot set_active a.
26. Use the volume keys to select and use the power button to click "Recovery mode".
27. Do steps 22 and 23 again (This flashes it in the slot that is not active.).
28. Go back a menu then click "Factory reset" then click "Format data/factory reset" and confirm it by clicking "Format data".

This section of instructions is for prepping to patch the boot image by pushing the magisk apk to /sdcard so it can be installed:
29. ./adb push ./Files/HavocOS\ 2022-04-17/Magisk/APK/Magisk-v24.3.apk /sdcard.
30. Boot, install apk, open, then follow the next section below.

This section of instructions is for flashing the patched boot image:
31. Hold power button and then click the Restart button then when the screen goes black hold the volume down and power button.
32. Click "Reboot" Click "Fastboot".
33. ./fastboot flash boot ./Files/HavocOS\ 2022-04-17/Patched\ BOOT\ IMAGE/magisk_patched-24300_QENbr.img.
34. Boot then open the app and follow the instruction about additonal things being required it will reboot.

This section is the list of modules I recommend using:
Energized Protection (energizedprotection-220215136.zip)
Universal SafetyNet Fix (safetynet-fix-v2.2.1.zip, safetynet-fix-v2.4.0.zip)
Systemless Hosts
Zygisk - LSPosed (LSPosed-v1.8.3-6552-zygisk-release.zip, Zygisk_-_LSPosed-v1.8.4(6609).zip, Zygisk_-_LSPosed-v1.8.5(6649).zip, Zygisk_-_LSPosed-v1.8.6(6712).zip)

This section is the list of what I put in the DenyList inside the magisk app:
CardValet com.fiservcardvalet.mobile.android
Crossy Road com.yodo1.crossyroad
Family Express com.familyexpress.finder
Google Play Store com.android.vending
Google Wallet com.google.android.apps.walletnfcrel
Meta Quest com.oculus.twilight
Telegram org.telegram.messenger

Dont know if these should actually be on the list:
Fitbit com.fitbit.FitbitMobile
Google Play Services for AR com.google.ar.core
Momo io.github.vvb2060.mahoshojo
Privacy com.privacy.pay
Ruru com.byxiaorun.detector
S Check com.hce.compliance.checker
TB Checker krypton.tbsafetychecker
Yet Another Safet...ttestation Checker rikka.safetynetchecker

This section is the LSPosed Modules I suggest:
Killergram (Killergram_22.03.12.apk)

Root Related APKs (Some I have not fully tested if they help):
HMA-V3.1.1.apk (Used to hide itself, Magisk, Lucky Patcher, two other apps might be Killergram, SudoHide, LSposed manager, bank app, icu.nullptr.applistdetector or com.byxiaorun.detector.)
Ruru.1.1.0.apk
SudoHide_1.28.5.apk

Other modules (some help, some I might not have fully tested):
reset-sensitive-props.zip
safetynet-fix-v2.4.0-MOD_1.2.zip
Shamiko-v0.6-126-release.zip

Some Apps That Can Use Root:
Termux
Hide My Applist
Device ID Changer
YASNAC
Momo
Ice Box
Lucky Patcher (Useful even if you don't root)
TB Checker
S Check
Ruru

Other APKs:
MGC_8.1.101_A9_GV2a_snap.apk
Magisk-v24.3.apk
Magisk-25.2(25200).apk
momo-v4.0.0.apk

Note Worthy APP(s):
https://play.google.com/store/apps/details?id=de.szalkowski.activitylauncher&hl=en&gl=US

To restore device for sale use:
https://forum.xda-developers.com/t/opn105g-oos-tmo-be88cb-unbrick-tool-to-restore-your-device-to-oxygenos.4245455/
Have to manually update to the latest version after installing.

Resources I used in the past for this phone:
https://www.didgeridoohan.com/magisk/HomePage
https://github.com/kdrag0n/safetynet-fix/releases
https://android.stackexchange.com/questions/245301/bypassing-advanced-root-modded-framework-detection
https://forum.xda-developers.com/t/guide-how-to-hide-the-root-of-bank-applications.4172127/#post-86008043
https://www.reddit.com/r/Magisk/comments/zsygbd/comment/j1bi32h/?utm_source=share&utm_medium=web2x&context=3
https://www.reddit.com/r/Magisk/comments/11czf11/comment/jad9ylp/?utm_source=share&utm_medium=web2x&context=3
https://www.reddit.com/r/LineageOS/comments/rj2pwx/comment/hp4jctk/?utm_source=share&utm_medium=web2x&context=3
https://www.reddit.com/r/LineageOS/comments/10nes50/comment/j6k856a/?utm_source=share&utm_medium=web2x&context=3
https://www.google.com/search?q=applist%20detector%20detects%20xposed%20modules%20&ie=utf-8&oe=utf-8&client=firefox-b